{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T08:12:06Z","timestamp":1767859926785,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540401896","type":"print"},{"value":"9783540448532","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_5","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T23:01:31Z","timestamp":1196463691000},"page":"59-73","source":"Crossref","is-referenced-by-count":57,"title":["Authorship Analysis in Cybercrime Investigation"],"prefix":"10.1007","author":[{"given":"Rong","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Yi","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Zan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF02402331","volume":"9","author":"B. Brainerd","year":"1975","unstructured":"B. Brainerd, Statistical analysis of Lexical data using Chi-squared and related distributions. Computers and the Humanities, 9, 161\u2013178. (1975).","journal-title":"Computers and the Humanities"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1080\/02664769922025","volume":"26\u20137","author":"Binongo","year":"1999","unstructured":"Binongo and Smith, A Study of Oscar Wilde\u2019s Writings, Journal of Applied Statistics, vol. 26\u20137, p. 781, (1999).","journal-title":"Journal of Applied Statistics"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/BF00136980","volume":"26","author":"R. H. Baayen","year":"1993","unstructured":"R. H. Baayen, Statistical Models for Word Frequency Distributions: A Linguistic Evaluation. Computers and the Humanities, 26 347\u2013363, 347\u2013363. (1993).","journal-title":"Computers and the Humanities"},{"key":"5_CR4","first-page":"110","volume":"2","author":"R. H. Baayen","year":"1996","unstructured":"R. H. Baayen, H. van Halteren, and F. J. Tweedie, Outside The Cave of Shadows: Using Syntactic Annotation to Enhance Authorship Attribution. Literary and Linguistic Computing, 2, 110\u2013120, (1996).","journal-title":"Literary and Linguistic Computing"},{"issue":"7","key":"5_CR5","doi-asserted-by":"publisher","first-page":"601","DOI":"10.2307\/2589242","volume":"105","author":"R. Bosch","year":"1998","unstructured":"R. Bosch and J. Smith, Separating hyperplanes and the authorship of the disputed federalist papers, American Mathematical Monthly, 105(7): 601\u2013608, (1998).","journal-title":"American Mathematical Monthly"},{"issue":"Number 8","key":"5_CR6","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1002\/(SICI)1097-4571(199806)49:8<693::AID-ASI4>3.0.CO;2-O","volume":"49","author":"H. Chen","year":"1998","unstructured":"H. Chen, G. Shankaranarayanan, A. Iyer, and L. She, A Machine Learning Approach to Inductive Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and Simulated Annealing, Journal of the American Society for Information Science, Volume 49, Number 8, Pages 693\u2013705, (1998).","journal-title":"Journal of the American Society for Information Science"},{"key":"5_CR7","unstructured":"N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press, (2000)."},{"key":"5_CR8","volume-title":"Statistical Language Learning","author":"E. Charniak","year":"1993","unstructured":"E. Charniak, Statistical Language Learning. MIT Press, Cambridge, (1993)."},{"key":"5_CR9","unstructured":"J. Diederich, J. Kindermann, E. Leopold, and G. Paass, Authorship Attribution with Support Vector Machines, Applied Intelligence, (2000)."},{"key":"5_CR10","first-page":"501","volume":"38","author":"W. Elliot","year":"1991","unstructured":"W. Elliot and R. Valenza, Was the Earl of Oxford The True Shakespeare? Notes and Queries, 38: 501\u2013506, (1991).","journal-title":"Notes and Queries"},{"key":"5_CR11","first-page":"38","volume-title":"The Computer and Literary Style","author":"I. S. Francis","year":"1966","unstructured":"I. S. Francis, An Exposition of a Statistical Approach to the Federalist Dispute. In J. Leed (Ed.), The Computer and Literary Style (pp. 38\u201379). Kent, Ohio: Kent State University Press. (1966)."},{"key":"5_CR12","volume-title":"Analyzing for Authorship A Guide to the Cusum Technique","author":"J. M. Farringdon","year":"1996","unstructured":"J. M. Farringdon, Analyzing for Authorship A Guide to the Cusum Technique. Cardiff: University of Wales Press. (1996)."},{"key":"5_CR13","volume-title":"Author Unknown: On the Trail of Anonymous","author":"D. Foster","year":"2000","unstructured":"D. Foster, Author Unknown: On the Trail of Anonymous, Henry Holt, New York, (2000)."},{"key":"5_CR14","unstructured":"A. Gray, P. Sallis, and S. MacDonell, Software forensics: Extending authorship analysis techniques to computer programs, in Proc. 3rd Biannual Conf. Int. Assoc. of Forensic Linguists (IAFL\u201997), pages 1\u20138, (1997)."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C. W. Hsu","year":"2002","unstructured":"C. W. Hsu and C. J. Lin. A comparison on methods for multi-class support vector machines, IEEE Transactions on Neural Networks, 13, pages 415\u2013425, (2002).","journal-title":"IEEE Transactions on Neural Networks"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/llc\/10.2.111","volume":"10","author":"D. I. Holmes","year":"1995","unstructured":"D. I. Holmes and R. S. Forsyth, The Federalist Revisited: New Directions in Authorship Attribution. Literary and Linguistic Computing, 10, 111\u2013127. (1995).","journal-title":"Literary and Linguistic Computing"},{"key":"5_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"D. I. Holmes","year":"1998","unstructured":"D. I. Holmes, The Evolution of Stylometry in Humanities. Literary and Linguistic Computing, 13, 3. (1998).","journal-title":"Literary and Linguistic Computing"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"T. Joachims, Text Categorization with Support Vector Machines, in: Proceedings of the European Conference on Machine learning (ECML), (1998).","DOI":"10.1007\/BFb0026683"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1093\/llc\/16.3.299","volume":"16","author":"D.V. Khmelev","year":"2001","unstructured":"D.V. Khmelev and F. J. Tweedir, Using Markov Chains for Identification of Writers, Literary and Linguistic Computing, vol. 16, no. 4, pp. 299\u2013307, (2001).","journal-title":"Literary and Linguistic Computing"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1093\/llc\/9.2.119","volume":"9","author":"B. Kjell","year":"1994","unstructured":"B. Kjell, Authorship Determination Using Letter-pair Frequency Features with Neural Network Classifiers. Literary and Linguistic Computing, 9, 119\u2013124. (1994).","journal-title":"Literary and Linguistic Computing"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/BF01829876","volume":"29","author":"D. Lowe","year":"1995","unstructured":"D. Lowe, and R. Matthews, Shakespeare vs. Fletcher: A Stylometric Analysis by Radial Basis Functions. Computers and the Humanities, 29, 449\u2013461 (1995).","journal-title":"Computers and the Humanities"},{"issue":"2","key":"5_CR22","first-page":"4","volume":"4","author":"R. P. Lippmann","year":"1987","unstructured":"R. P. Lippmann, An Introduction to Computing with Neural Networks, IEEE Acoustics Speech and Signal Processing Magazine, 4(2): 4\u201322, (1987).","journal-title":"IEEE Acoustics Speech and Signal Processing Magazine"},{"key":"5_CR23","volume-title":"Inference and Disputed Authorship: The Federalist","author":"F. Mosteller","year":"1964","unstructured":"F. Mosteller and D. L. Wallace, Inference and Disputed Authorship: The Federalist, Addison-Wesley, Reading, Mass., (1964)."},{"key":"5_CR24","unstructured":"F. Mosteller, Frederick, and D. L. Wallace, Applied Bayesian and Classical Inference: the Case of the Federalist Papers, in the 2nd edition of Inference and Disputed Authorship, The Federalist, Springer-Verlag, (1964)."},{"key":"5_CR25","unstructured":"A. McCallum and K. Nigam, A Comparison of Event Models for Naive Bayes Text Classification. AAAI-98 Workshop on \u201cLearning for Text Categorization\u201d, (1998)."},{"key":"5_CR26","unstructured":"J. Moody and J. Utans, Architecture Selection Strategies for Neural Networks Application to Corporate Bond Rating, Neural Networks in the Capital Markets, (1995)."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"E. Osuna, R. Freund and F. Girosi, Training Support Vector Machines: An Application to Face Detection, Proceedings of Computer Vision and Pattern Recognition, 130\u2013136, (1997).","DOI":"10.1109\/CVPR.1997.609310"},{"issue":"1","key":"5_CR28","first-page":"81","volume":"1","author":"J. R. Quinlan","year":"1986","unstructured":"J. R. Quinlan, Induction of Decision Trees, Machine Learning, 1(1): 81\u2013106, (1986).","journal-title":"Machine Learning"},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1001018624850","volume":"31","author":"J. Rudman","year":"1998","unstructured":"J. Rudman, The State of Authorship Attribution Studies: Some Problems and Solutions. Computers and the Humanities, 31, 351\u2013365. (1998).","journal-title":"Computers and the Humanities"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1093\/biomet\/74.3.445","volume":"74","author":"R. Thisted","year":"1987","unstructured":"R. Thisted, and B. Efron, Did Shakespeare Write a Newly Discovered Poem? Biometrika, 74, 445\u2013455. (1987).","journal-title":"Biometrika"},{"key":"5_CR31","volume-title":"Introduction \u2014 Cyber Crime: law enforcement, security and surveillance in the information age","author":"D. Thomas","year":"2000","unstructured":"D. Thomas, and B. D. Loader, Introduction \u2014 Cyber Crime: law enforcement, security and surveillance in the information age, Taylor & Francis Group, New York, NY, (2000)."},{"key":"5_CR32","first-page":"165","volume-title":"Revue, Informatique et Statistique dans les Sciences Humaines","author":"T. Tomoji","year":"1994","unstructured":"T. Tomoji, Dickens\u2019s Narrative Style: A Statistical Approach to Chronological Variation. Revue, Informatique et Statistique dans les Sciences Humaines (RISSH, Centre Informatique de Philosophie et Lettres, Universite de Liege, Belgique), 30, 165\u2013182, (1994)."},{"issue":"1","key":"5_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00054024","volume":"30","author":"F. J. Tweedie","year":"1996","unstructured":"F. J. Tweedie, S. Singh, and D. I. Holmes, Neural Network Applications in Stylometry: The Federalist Papers. Computers and the Humanities, 30(1), 1\u201310 (1996).","journal-title":"Computers and the Humanities"},{"issue":"2","key":"5_CR34","first-page":"139","volume":"30","author":"K. M. Tolle","year":"2000","unstructured":"K. M. Tolle, H. Chen and H. Chow, Estimating Drug\/Plasma Concentration Levels by Applying Neural Networks to Pharmacokinetic Data Sets, Decision Support Systems, Special Issue on Decision Support for Health Care in a New Information Age, 30(2), 139\u2013152, (2000).","journal-title":"Special Issue on Decision Support for Health Care in a New Information Age"},{"issue":"4","key":"5_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O. Vel de","year":"2001","unstructured":"O. de Vel, A. Anderson, M. Corney and G. Mohay, Mining E-mail Content for Author Identification Forensics, SIGMOD Record, 30(4): 55\u201364, (2001).","journal-title":"SIGMOD Record"},{"key":"5_CR36","unstructured":"O. de Vel, Mining e-mail authorship. In Proc. Workshop on Text Mining, ACM International Conference on Knowledge Discovery and Data Mining (KDD\u20192000), (2000)."},{"key":"5_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"V. Vapnik, The Nature of Statistical Learning Theory, Springer Verlag, New York, (1995)."},{"key":"5_CR38","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/175247.175257","volume":"37","author":"B. Widrow","year":"1994","unstructured":"B. Widrow, D. E. Rumelhart and M. A. Lehr, Neural Networks: Applications in Industry, Business, and Science, Communications of the ACM, 37, 93\u2013105, (1994).","journal-title":"Communications of the ACM"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"G. U. Yule, On sentence length as a statistical characteristic of style in prose, Bometrikka, 30, (1938).","DOI":"10.2307\/2332655"},{"key":"5_CR40","unstructured":"G. U. Yule, The statistical study of literary vocabulary, Cambridge University Press, (1944)."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T07:09:46Z","timestamp":1557040186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}